Dr.-Ing. Thomas Gamer
- Researcher
 - Office Hours: Nach Vereinbarung
 - Room: 351
 - Phone: +49 721 608-46401
 - Fax: +49 721 608-46789
 - gamer ∂does-not-exist.tm uka de
 
Forschungsbereich Telematik
Institut für Telematik
Karlsruher Institut für Technologie (KIT)
Geb. 20.20
Zirkel 2
D-76131 Karlsruhe
[PGP Key]
Personal data
Research Topics:
- Routing, Security, and Usability in WLAN Mesh Networks
 - Anomaly-based collaborative Attack Detection and Identification
 - Management and Traffic Monitoring in the "Future Internet"
 - Security in the E-Energy Context
 
Awards
2009: Exercise Lecture "Übungen zu Telematik" has been awarded as best Exercise Lecture by a Student Evaluation.
2007: Exercise Lecture "Übungen zu Telematik" has been awarded as best Exercise Lecture by a Student Evaluation.
2005: Diploma thesis has been awarded by the GI/ITG group "Communications and Distributed Systems (KuVS)".
| T. Gamer.  Dezentrale, Anomalie-basierte Erkennung verteilter Angriffe im Internet. Dissertation, ISBN 978-3-86644-491-1, KIT Scientific Publishing, 2010  | 
    
| T. Gamer, M. Roth, M. Bahr, C. Schwingenschlögl.  Netzwerkzugangsknoten mit Schlüsselverteilerfunktion. 10 2010 018 285.0, April 2010  | 
| T. Gamer, M. Bahr, C. Schwingenschlögl, M. Roth.  Schlüsselverteilerknoten für ein Netzwerk. 10 2010 018 286.9, April 2010  | 
| L. Völker, T. Gamer, C. Schwingenschlögl, M. Bahr.  Verfahren zur Bereitstellung von Sicherheitsmechanismen in drahtlosen Mesh-Netzwerken. PCT/EP2009/007707, October 2009  | 
    
| T. Gamer, C. Mayer.  Simulative Evaluation of Distributed Attack Detection in Large-scale Realistic Environments. In: SIMULATION: Transaction of The Society for Modeling and Simulation International, Vol. 87, No. 7, pp. 630-647, July 2011  | 
| T. Gamer, L. Völker, M. Zitterbart.  Differentiated Security in Wireless Mesh Networks. In: Security and Communication Networks - Special Issue on Security for QoS Assured Wireless and Mobile Networks, Vol. 4, No. 3, Wiley, ISSN 1939-0122, pp. 257-266, September 2010  | 
| T. Gamer, C. Mayer, M. Schöller.  PktAnon - A Generic Framework for Profile-based Traffic Anonymization. In: PIK Praxis der Informationsverarbeitung und Kommunikation (PIK), 31, 2, 76-81, June 2008  | 
    
| H. Wippel, T. Gamer, C. Faller, M. Zitterbart.  Hierarchical Node Management in the Future Internet. Proc. of 4th International Workshop on the Network of the Future (FutureNet) in conjunction with IEEE ICC, Kyoto, Japan, June 2011  | 
| I. Baumgart, T. Gamer, C. Hübsch, C. Mayer.  Realistic Underlays for Overlay Simulation. Proceedings of Workshop on OMNeT++, Barcelona, Spain, March 2011  | 
| T. Gamer, H. Wippel.  A Collaborative Attack Detection and its Challenges in the Future Internet. To appear in: Proc. of the Joint ITG, ITC, and Euro-NF Workshop "Visions of Future Generation Networks" (EuroView), Würzburg, Germany, August 2010  | 
| H. Wippel, T. Gamer, D. Martin.  A Hierarchical Node Management System for Application-tailored Network Protocols and Architectures. 5th GI/ITG KuVS Workshop on Future Internet, Stuttgart, Germany, June 2010  | 
| M. Cornils, T. Gamer, M. Bahr.  Simulative Analysis of the Hybrid Wireless Mesh Protocol (HWMP). Proc. of European Wireless (EW), Lucca, Italy, April 2010  | 
| T. Gamer.  Anomaly-based Identification of Large-Scale Attacks. Proc. of Global Communications Conference (Globecom), Honolulu, Hawaii, USA, December 2009  | 
| T. Gamer, C. Mayer.  Large-scale Evaluation of Distributed Attack Detection. Digital Proceedings of 2nd International Workshop on OMNeT++ (Hosted by SIMUTools), Rome, Italy, March 2009  | 
| T. Gamer.  Distributed Detection of Large-Scale Attacks in the Internet. Proceedings of the Student Workshop of 4th ACM International Conference on emerging Networking EXperiments and Technologies (ACM CoNEXT 2008), Madrid, Spain, December 2008  | 
| T. Gamer, C. Mayer, M. Zitterbart.  Distack - A Framework for Anomaly-based Large-scale Attack Detection. Second International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2008), 34-40, Cap Esterel, France, August 2008  | 
| T. Gamer, M. Scharf.  Realistic Simulation Environments for IP-based Networks. Digital Proceedings of 1st International Workshop on OMNeT++ (Hosted by SIMUTools '08: 1st International Conference on Simulation Tools and Techniques), Marseille, France, March 2008  | 
| T. Gamer, M. Schöller, M. Scharf.  Collaborative Anomaly-based Attack Detection. Proceedings of 2nd International Workshop on Self-Organizing Systems (IWSOS 2007), 280-287, English Lake District, UK, September 2007  | 
| T. Gamer.  A System for in-Network Anomaly Detection. Kommunikation in Verteilten Systemen, 275-282, Bern, Switzerland, February 2007  | 
| R. Bless, T. Gamer, M. Schöller.  An extensible and flexible System for Network Anomaly Detection. Proceedings of Autonomic Networking 2006, 97-108, Paris, France, September 2006  | 
| R. Bless, T. Gamer, M. Schöller.  A Granularity-adaptive System for in-Network Attack Detection. Proceedings of the IEEE / IST Workshop on Monitoring, Attack Detection and Mitigation 2006, 47-50, Tübingen, Germany, September 2006  | 
| M. Schöller, T. Gamer, R. Bless, M. Zitterbart.  An Extension to Packet Filtering of Programmable Networks. 7th International Working Conference on Active Networking (IWAN), Sophia Antipolis, France, November 2005  | 
    
| T. Gamer, L. Völker, M. Zitterbart.  Differentiated Security in Wireless Mesh Networks. Proceedings of the 4th ACM Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet), pp. 111-112, Vancouver, British Columbia, Canada, October 2008  | 
    
| C. Mayer, T. Gamer, M. Zitterbart.  Towards Understanding the Global Behavior of DDoS Attacks - A Framework for Distributed Attack Detection and Beyond. EURECOM Security Resarch Seminar, Sophia-Antipolis, France, August 2008  | 
| T. Gamer, C. Mayer.  Distack: Framework zur einfachen Entwicklung von Mechanismen zur lokalen und verteilten Angriffserkennung. 3. Essener Workshop "Neue Herausforderungen in der Netzsicherheit" (EWNS08), Duisburg/Essen, Germany, April 2008  | 
| T. Gamer, J. Breitwieser.  Identifikation von Angriffen auf Basis von Verkehrsanomalien. April 2008  | 
| C. Mayer, T. Gamer, M. Schöller.  Datenschutzkonforme Anonymisierung von Datenverkehr auf einem Vermittlungssystem. 2. Essener Workshop "Neue Herausforderungen in der Netzsicherheit", Duisburg/Essen, Germany, October 2006  | 
| T. Gamer.  Mehrstufiges System zur Anomalie-basierten Angriffserkennung in Hochgeschwindigkeitsnetzen. October 2005  | 
    
| I. Baumgart, T. Gamer, C. Hübsch, C. Mayer.  Realistic Underlays for Overlay Simulation. Technical Report TM-2011-1, Institute of Telematics, Karlsruhe Institute of Technology, January 2011  | 
| C. Mayer, T. Gamer.  Integrating real world applications into OMNeT++. TM-2008-2, February 2008  | 
| T. Gamer, C. Sorge, M. Zitterbart, O. Raabe.  Datenschutz in Kommunikationsnetzen. Seminar SS06. Technischer Bericht TM-2006-3, Institute of Telematics, Karlsruhe Institute of Technology, July 2006  | 
| C. Vogt, T. Küfner, S. Krause, T. Gamer, M. Zitterbart.  Mobiles Internet. Seminar WS05/06. Technischer Bericht TM-2006-2, Institute of Telematics, Karlsruhe Institute of Technology, February 2006  | 
    
| T. Gamer.  Mehrstufiges System zur Anomalie-basierten Angriffserkennung in Hochgeschwindigkeitsnetzen. May 2005  | 
    
| T. Gamer.  Behandlung von Fragmenten in IPsec. March 2004  | 
    
| Title | Advisor | Editor | 
|---|---|---|
| Anomaly based detection of simultaneous DDoS attacks | Thomas Gamer | Denise Dudek | 
| Anomaly-based identification of attacks in the Internet | Thomas Gamer | Jannis Breitwieser | 
| Effectiveness of a collaborative attack detection system in simulated IP networks | Thomas Gamer | Michael Scharf | 
| Framework for network anomaly detection using distributed entities | Thomas Gamer | Christoph Mayer | 
| Simulative analysis of the IEEE 802.11s hybrid wireless mesh protocol (HWMP) | Thomas Gamer | Malte Cornils | 
| Concepts for an autonomous management in component-based communication systems | Thomas Gamer, Hans Wippel | Claus Faller | 
| Security in WLAN meshes based on different trust levels | Thomas Gamer, Lars Völker | Frank-Michael Krupp | 
| Protection of a collaborative attack detection | Thomas Gamer, Roland Bless | Frank Scherrer |